{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T21:01:34Z","timestamp":1763499694220,"version":"build-2065373602"},"reference-count":53,"publisher":"MDPI AG","issue":"23","license":[{"start":{"date-parts":[[2021,11,23]],"date-time":"2021-11-23T00:00:00Z","timestamp":1637625600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100007458","name":"Qatar Foundation","doi-asserted-by":"publisher","award":["121"],"award-info":[{"award-number":["121"]}],"id":[{"id":"10.13039\/100007458","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>The Industrial Internet of Things (IIoT) has led to the growth and expansion of various new opportunities in the new Industrial Transformation. There have been notable challenges regarding the security of data and challenges related to privacy when collecting real-time and automatic data while observing applications in the industry. This paper proposes an Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT. In FT-Block (Federated transfer learning blockchain), several blockchains are applied to preserve privacy and security for all types of industrial applications. Additionally, by introducing the authentication mechanism based on transfer learning, blockchains can enhance the preservation and security standards for industrial applications. Specifically, Novel Supportive Twin Delayed DDPG trains the user model to authenticate specific regions. As it is considered one of the most open and scalable interacting platforms of information, it successfully helps in the positive transfer of different kinds of data between devices in more significant and local operations of the industry. It is mainly due to a single authentication factor, and the poor adaptation to regular increases in the number of users and different requirements that make the current authentication mechanism suffer a lot in IIoT. As a result, it has been very clearly observed that the given solutions are very useful.<\/jats:p>","DOI":"10.3390\/s21237793","type":"journal-article","created":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T01:45:02Z","timestamp":1638323102000},"page":"7793","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":51,"title":["Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT"],"prefix":"10.3390","volume":"21","author":[{"given":"Arumugam","family":"K","sequence":"first","affiliation":[{"name":"Department of Computer Science, Karpagam Academy of Higher Education, Coimbatore 641021, India"}]},{"given":"Srimathi","family":"J","sequence":"additional","affiliation":[{"name":"Vivekanandha Institute of Information and Management Studies, Elaiyampalayam 637205, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1999-1858","authenticated-orcid":false,"given":"Sudhanshu","family":"Maurya","sequence":"additional","affiliation":[{"name":"School of Computing, Bhimtal Campus, Graphic Era Hill University, Uttarkhand 248001, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5782-5498","authenticated-orcid":false,"given":"Senoj","family":"Joseph","sequence":"additional","affiliation":[{"name":"Department of Electronics and Communication Engineering, Sri Krishna College of Technology, Kovaipudar, Coimbatore 641042, India"}]},{"given":"Anju","family":"Asokan","sequence":"additional","affiliation":[{"name":"Department of Electronics and Communication Engineering, Sri Krishna College of Technology, Kovaipudar, Coimbatore 641042, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6801-6138","authenticated-orcid":false,"given":"Poongodi","family":"M","sequence":"additional","affiliation":[{"name":"Division of Information and Computing Technology, College of Science and Engineering, Hamad Bin Khalifa University, Qatar Foundation, Doha 582500, Qatar"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1514-9185","authenticated-orcid":false,"given":"Abdullah A.","family":"Algethami","sequence":"additional","affiliation":[{"name":"Department of Engineering, Taif University, Taif 26312, Saudi Arabia"}]},{"given":"Mounir","family":"Hamdi","sequence":"additional","affiliation":[{"name":"Division of Information and Computing Technology, College of Science and Engineering, Hamad Bin Khalifa University, Qatar Foundation, Doha 582500, Qatar"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1515-3187","authenticated-orcid":false,"given":"Hafiz Tayyab","family":"Rauf","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Faculty of Engineering, University of Bradford, Bradford BD7-01274, UK"}]}],"member":"1968","published-online":{"date-parts":[[2021,11,23]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.compind.2018.04.015","article-title":"The industrial internet of things (IIoT): An analysis framework","volume":"101","author":"Boyes","year":"2018","journal-title":"Comput. Ind."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"4724","DOI":"10.1109\/TII.2018.2852491","article-title":"Industrial Internet of Things: Challenges, Opportunities, and Directions","volume":"14","author":"Sisinni","year":"2018","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_3","unstructured":"Wang, X., Garg, S., Lin, H., Kaddoum, G., Hu, J., and Hossain, M.S. (2020). A Secure Data Aggregation Strategy in Edge Computing and Blockchain empowered Internet of Things. IEEE Internet Things J."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"102481","DOI":"10.1016\/j.jnca.2019.102481","article-title":"A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT","volume":"149","author":"Sengupta","year":"2020","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"4674","DOI":"10.1109\/TII.2018.2855198","article-title":"Deploying Fog Computing in Industrial Internet of Things and Industry 4.0","volume":"14","author":"Aazam","year":"2018","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Mhamdi, L., and Hamdi, M. (2004, January 20\u201324). Scheduling multicast traffic in internally buffered crossbar switches. Proceedings of the 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577), Paris, France.","DOI":"10.1109\/ICC.2004.1312671"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"7085","DOI":"10.1109\/TII.2020.3023677","article-title":"Voice-Transfer Attacking on Industrial Voice Control Systems in 5G-Aided IIoT Domain","volume":"17","author":"Wang","year":"2020","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"3559","DOI":"10.1109\/TII.2019.2897805","article-title":"Performance Optimization for Blockchain-Enabled Industrial Internet of Things (IIoT) Systems: A Deep Reinforcement Learning Approach","volume":"15","author":"Liu","year":"2019","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_9","first-page":"223","article-title":"Securing Cloud information with the use of Bastion Algorithm to enhance Confiden-tiality and Protection","volume":"118","author":"Jeyachandran","year":"2018","journal-title":"Int. J. Pure Appl. Math."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"2072","DOI":"10.1109\/49.887926","article-title":"Providing deterministic quality-of-service guarantees on WDM optical networks","volume":"18","author":"Ma","year":"2000","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"7725","DOI":"10.1109\/TII.2021.3049405","article-title":"Enabling Secure Authentication in Industrial IoT with Transfer Learning Empowered Blockchain","volume":"17","author":"Wang","year":"2021","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"2000","DOI":"10.1109\/TWC.2014.022014.130840","article-title":"TACT: A transfer actor-critic learning framework for energy saving in cellular radio access networks","volume":"13","author":"Li","year":"2014","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/MNET.2019.1800344","article-title":"Edge Intelligence in the Cognitive Internet of Things: Improving Sensitivity and Interactivity","volume":"33","author":"Zhang","year":"2019","journal-title":"IEEE Netw."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"821","DOI":"10.26599\/TST.2020.9010041","article-title":"Anomaly detection of industrial control systems based on transfer learning","volume":"26","author":"Wang","year":"2021","journal-title":"Tsinghua Sci. Technol."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"396","DOI":"10.1504\/IJITST.2020.108130","article-title":"Bitcoin price prediction using ARIMA model","volume":"10","author":"Poongodi","year":"2020","journal-title":"Int. J. Internet Technol. Secur. Trans."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"150","DOI":"10.26599\/TST.2020.9010029","article-title":"Enriching the transfer learning with pre-trained lexicon embedding for low-resource neural machine translation","volume":"27","author":"Maimaiti","year":"2021","journal-title":"Tsinghua Sci. Technol."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1984","DOI":"10.1109\/TII.2019.2936278","article-title":"Blockchain-Based Anonymous Authentication With Key Management for Smart Grid Edge Computing Infrastructure","volume":"16","author":"Wang","year":"2020","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"29","DOI":"10.26599\/BDMA.2019.9020017","article-title":"A semi-supervised attention model for identifying authentic sneakers","volume":"3","author":"Yang","year":"2020","journal-title":"Big Data Min. Anal."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"3775","DOI":"10.1109\/JIOT.2019.2892009","article-title":"BLA: BlockchainAssisted Lightweight Anonymous Authentication for Distributed Vehicular Fog Services","volume":"6","author":"Yao","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1","DOI":"10.26599\/BDMA.2020.9020010","article-title":"New enhanced authentication protocol for Internet of Things","volume":"4","author":"Azrour","year":"2021","journal-title":"Big Data Min. Anal."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"4146","DOI":"10.1109\/TII.2019.2948053","article-title":"BPAS: Blockchain-Assisted Privacy-Preserving Authentication System for Vehicular Ad Hoc Networks","volume":"16","author":"Feng","year":"2020","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"7081","DOI":"10.1109\/TII.2019.2942389","article-title":"Designing Secure Lightweight Blockchain-Enabled RFID-Based Authentication Protocol for Supply Chains in 5G Mobile Edge Computing Environment","volume":"16","author":"Jangirala","year":"2019","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1109\/TWC.2013.120413.130767","article-title":"Harnessing Frequency Domain for Cooperative Sensing and Multi-channel Contention in CRAHNs","volume":"13","author":"Wang","year":"2014","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"102331","DOI":"10.1109\/ACCESS.2019.2928325","article-title":"Smart Contract Based Data Trading Mode Using Blockchain and Machine Learning","volume":"7","author":"Xiong","year":"2019","journal-title":"IEEE Access"},{"key":"ref_25","unstructured":"Pun, K., and Hamdi, M. (2003, January 17\u201321). Distro: A distributed static round-robin scheduling algorithm for bufferless Clos-Network switches. Proceedings of the Global Telecommunications Conference 2002, GLOBECOM\u201902, Taipei, Taiwan."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"3068","DOI":"10.1109\/TVT.2020.2967026","article-title":"Reinforcement Learning Based PHY Authentication for VANETs","volume":"69","author":"Lu","year":"2020","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1080\/01611194.2019.1706060","article-title":"Securing and authenticating healthcare records through blockchain technology","volume":"44","author":"Pandey","year":"2020","journal-title":"Cryptologia"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1016\/j.procs.2015.04.053","article-title":"Detection and Prevention System towards the Truth of Convergence on Decision Using Aumann Agreement Theorem","volume":"50","author":"Poongodi","year":"2015","journal-title":"Procedia Comput. Sci."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"3713","DOI":"10.1109\/TVT.2009.2013234","article-title":"Open-Loop Link Adaptation for Next-Generation IEEE 802.11n Wireless Networks","volume":"58","author":"Xia","year":"2009","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Poongodi, M., Hamdi, M., Vijayakumar, V., Rawal, B.S., and Maode, M. (2020, January 10\u201312). An Effective Electronic waste management solution based on Blockchain Smart Contract in 5G Communities. Proceedings of the 2020 IEEE 3rd 5G World Forum (5GWF), Bangalore, India.","DOI":"10.1109\/5GWF49715.2020.9221346"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"6692","DOI":"10.1109\/JIOT.2019.2910233","article-title":"Authentication of Wireless Devices in the Internet of Things: Learning and Environmental Effects","volume":"6","author":"Dabbagh","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_32","first-page":"1708","article-title":"An ExperienceGuided Deep Deterministic Actor-Critic Algorithm with Multi-Actor","volume":"56","author":"Chen","year":"2019","journal-title":"J. Comput. Res. Dev."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Zheng, Z., Yuan, C., Lin, Z., Cheng, Y., and Wu, H. (2018, January 13\u201319). Self-Adaptive Double Bootstrapped DDPG. Proceedings of the 27th International Joint Conference on Artificial Intelligence, Stockholm, Sweden.","DOI":"10.24963\/ijcai.2018\/444"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Zedini, E., Oubei, H.M., Kammoun, A., Hamdi, M., Ooi, B.S., and Alouini, M.-S. (2017, January 4\u20138). A New Simple Model for Underwater Wireless Optical Channels in the Presence of Air Bubbles. Proceedings of the GLOBECOM 2017\u20142017 IEEE Global Communications Conference, Singapore.","DOI":"10.1109\/GLOCOM.2017.8254240"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/IJISP.2014040101","article-title":"A Firegroup Mechanism to Provide Intrusion Detection and Prevention System Against DDos Attack in Collaborative Clustered Networks","volume":"8","author":"Poongodi","year":"2014","journal-title":"Int. J. Inf. Secur. Priv."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Baccour, E., Foufou, S., Hamila, R., and Hamdi, M. (2015, January 18\u201320). A survey of wireless data center networks. Proceedings of the 2015 49th Annual Conference on Information Sciences and Systems (CISS), Baltimore, MD, USA.","DOI":"10.1109\/CISS.2015.7086853"},{"key":"ref_37","first-page":"574","article-title":"The COLLID based intrusion detection system for detection against DDOS attacks using trust evaluation","volume":"9","author":"Poongodi","year":"2015","journal-title":"Adv. Nat. Appl. Sci."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1016\/j.comnet.2015.01.006","article-title":"Designing efficient high performance server-centric data center network architecture","volume":"79","author":"Wang","year":"2015","journal-title":"Comput. Netw."},{"key":"ref_39","first-page":"263","article-title":"The effective intrusion detection system using optimal feature selection algorithm","volume":"6","author":"Poongodi","year":"2015","journal-title":"Int. J. Enterp. Netw. Manag."},{"key":"ref_40","unstructured":"Lin, D., Liu, Y., Hamdi, M., and Muppala, J. (2012, January 3\u20137). FlatNet: Towards a flatter data center network. Proceedings of the 2012 IEEE Global Communications Conference (GLOBECOM), Anaheim, CA, USA."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"12230","DOI":"10.1007\/s11227-021-03765-w","article-title":"Smart healthcare in smart cities: Wireless patient monitoring system using IoT","volume":"77","author":"Poongodi","year":"2021","journal-title":"J. Supercomput."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"1549","DOI":"10.1007\/s10586-015-0496-y","article-title":"Stochastic model: ReCAPTCHA controller based co-variance matrix analysis on frequency distribution using trust evaluation and re-eval by Aumann agreement theorem against DDoS attack in MANET","volume":"18","author":"Poongodi","year":"2015","journal-title":"Clust. Comput."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"1764","DOI":"10.1109\/TWC.2008.061047","article-title":"Smart sender: A practical rate adaptation algorithm for multirate IEEE 802.11 WLANs","volume":"7","author":"Xia","year":"2008","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Poongodi, M., Hamdi, M., Malviya, M., Sharma, A., Dhiman, G., and Vimal, S. (2021). Diagnosis and combating COVID-19 using wearable Oura smart ring with deep learning methods. Pers. Ubiquitous Comput., 1\u201311.","DOI":"10.1007\/s00779-021-01541-4"},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"2732","DOI":"10.1109\/TWC.2007.06019","article-title":"Cross Layer Design for the IEEE 802.11 WLANs: Joint Rate Control and Packet Scheduling","volume":"6","author":"Xia","year":"2007","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_46","unstructured":"M, P., Hamdi, M., Varadarajan, V., Rawal, B.S., and Maode, M. (2020, January 6\u20139). Building an Authentic and Ethical Keyword Search by applying Decentralised (Blockchain) Verification. Proceedings of the IEEE INFOCOM 2020\u2014IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Toronto, ON, Canada."},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Xia, Q., and Hamdi, M. (2006, January 11\u201315). Contention Window Adjustment for IEEE 802.11 WLANs: A Control-Theoretic Approach. Proceedings of the 2006 IEEE International Conference on Communications, Istanbul, Turkey.","DOI":"10.1109\/ICC.2006.255694"},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"3681","DOI":"10.1109\/JIOT.2020.2967788","article-title":"Blockchain-Enabled Cross-Domain Object Detection for Autonomous Driving: A Model Sharing Approach","volume":"7","author":"Jiang","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"e755","DOI":"10.7717\/peerj-cs.755","article-title":"Intelligent scaling for 6G IoE services for resource provisioning","volume":"7","author":"Alharbi","year":"2021","journal-title":"PeerJ Comput. Sci."},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Poongodi, M., and Bose, S. (2013, January 18\u201320). Design of Intrusion Detection and Prevention System (IDPS) using DGSOTFC in collaborative protection networks. Proceedings of the 2013 Fifth International Conference on Advanced Computing (ICoAC), Chennai, India.","DOI":"10.1109\/ICoAC.2013.6921946"},{"key":"ref_51","first-page":"241","article-title":"A Hybrid BlockChain-Based Identity Authentication Scheme for MultiWSN","volume":"13","author":"Cui","year":"2020","journal-title":"IEEE Trans. Serv. Comput."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"1972","DOI":"10.1109\/TII.2019.2938001","article-title":"Blockchain Meets Edge Computing: A Distributed and Trusted Authentication System","volume":"16","author":"Guo","year":"2019","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"4057","DOI":"10.3233\/JIFS-169966","article-title":"Recommendation model based on trust relations & user credibility","volume":"36","author":"Poongodi","year":"2019","journal-title":"J. Intell. Fuzzy Syst."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/23\/7793\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T07:34:45Z","timestamp":1760168085000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/23\/7793"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,23]]},"references-count":53,"journal-issue":{"issue":"23","published-online":{"date-parts":[[2021,12]]}},"alternative-id":["s21237793"],"URL":"https:\/\/doi.org\/10.3390\/s21237793","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2021,11,23]]}}}